Refers to malicious software viruses including worms, spyware, ransomware, adware, and trojans. - Malware, It is a type of social engineering attack wherein an attacker impersonates to be a trusted contact and sends the victim fake mails. - Phishing, is a network security device that monitors and filters incoming and outgoing network traffic - Firewall, is a kind of software used to prevent, scan, detect and delete viruses from a computer. - Antivirus, In this attack, an attacker comes in between a two-party communication, i.e., the attacker hijacks the session between a client and host. By doing so, hackers steal and manipulate data. - Man-in-the-middle atttack, is a security mechanism that creates a virtual trap to lure (attract) attackers. - Honeypot, a dishonest scheme; a fraud. - Scam, when information is exposed to unauthorized people due to internal errors. - Data leak, is any incident that results in unauthorized access to computer data, applications, networks or devices. - Security breach, convert (information or data) into a code, especially to prevent unauthorized access. - Encrypted, An app generates a six- to eight-digit security key in a specific time window, usually refreshes in every 25-30 seconds. - Authenticator app, ny information collected by an entity that does not have a direct relationship with the user the data is being collected on - Third party , someone who is in a place or situation where they are not wanted - Intruder, an attempt by hackers to damage or destroy a computer network or system. - Cyber attack, is the protection of internet-connected systems such as hardware, software and data from cyberthreats. - Cyber security,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?